Sciweavers

1664 search results - page 180 / 333
» Testing in the Component Age
Sort
View
135
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 8 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
GECCO
2006
Springer
137views Optimization» more  GECCO 2006»
15 years 7 months ago
Evolutionary design of fault-tolerant analog control for a piezoelectric pipe-crawling robot
In this paper, a genetic algorithm (GA) is used to design faulttolerant analog controllers for a piezoelectric micro-robot. Firstorder and second-order functions are developed to ...
Geoffrey A. Hollinger, David A. Gwaltney
ATAL
2003
Springer
15 years 7 months ago
Using web helper agent profiles in query generation
Personalized information agents can help overcome some of the limitations of communal Web information sources such as portals and search engines. Two important components of these...
Gabriel Somlo, Adele E. Howe
SIGGRAPH
1991
ACM
15 years 7 months ago
Design and simulation of opera lighting and projection effects
A major problem challenging opera designers is the inability to coordinate lighting, projection systems, and set designs in the preliminary planning phase. New computer graphics t...
Julie Dorsey, François X. Sillion, Donald P...
CAISE
2008
Springer
15 years 6 months ago
A New Paradigm for the Enactment and Dynamic Adaptation of Data-Driven Process Structures
Abstract. Industry is increasingly demanding IT support for large engineering processes, i.e., process structures consisting of hundreds up to thousands of processes. Developing a ...
Dominic Müller, Manfred Reichert, Joachim Her...